Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHackers Abuse ScreenConnect to Hijack PCs via Fake Social Security Emails
Hackers Abuse ScreenConnect to Hijack PCs via Fake Social Security Emails
Cybersecurity

Hackers Abuse ScreenConnect to Hijack PCs via Fake Social Security Emails

•February 17, 2026
0
HackRead
HackRead•Feb 17, 2026

Why It Matters

By hijacking legitimate remote‑support software, attackers gain persistent, stealthy access to critical networks, raising breach risk for sensitive industries. Organizations must treat unexpected government‑related attachments as high‑risk and reinforce endpoint defenses.

Key Takeaways

  • •Hackers impersonate SSA, send .cmd attachment.
  • •Script disables SmartScreen, removes Mark‑of‑Web.
  • •Uses ADS to hide, silently installs ScreenConnect RAT.
  • •Targets government, healthcare, logistics sectors.
  • •ScreenConnect version uses revoked certificate, callbacks Iran server.

Pulse Analysis

Phishing campaigns that masquerade as government communications have surged, and the latest wave leverages a fake Social Security Administration email to distribute a malicious .cmd payload. Unlike traditional ransomware that relies on novel code, this attack exploits human trust and familiar branding, increasing click‑through rates across the UK, US, Canada, and Northern Ireland. The initial email contains subtle red flags—misspelled domains and titles—but many users overlook them, providing a foothold for the script to execute.

Once executed, the script performs a series of stealthy maneuvers: it uses PowerShell auto‑elevation to gain admin rights, disables Windows SmartScreen, strips the Mark‑of‑Web tag, and writes malicious components into Alternate Data Streams. These techniques effectively blind built‑in Windows defenses, allowing a silent installation of ConnectWise ScreenConnect version 25.2.4.9229. By repurposing a legitimate remote‑support tool with a revoked certificate, the attackers create a credible backdoor that calls home to an Iranian server on port 8041, blending into normal network traffic and evading many security solutions.

The broader implication for enterprises is clear: reliance on trusted utilities does not guarantee safety. High‑value sectors such as government, healthcare, and logistics must adopt a layered security approach—combining robust email filtering, strict application whitelisting, and continuous endpoint monitoring. User education remains vital; treating any unexpected government attachment as suspicious can stop the chain before escalation. As threat actors continue to weaponize everyday software, organizations that proactively harden defenses and enforce zero‑trust principles will be better positioned to mitigate these sophisticated intrusion attempts.

Hackers Abuse ScreenConnect to Hijack PCs via Fake Social Security Emails

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...